4.6 Article

Conditional Privacy-Preserving Authentication Protocol With Dynamic Membership Updating for VANETs

Journal

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Volume 19, Issue 3, Pages 2089-2104

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2020.3047872

Keywords

Authentication; Protocols; Cathode ray tubes; Security; Privacy; Vehicular ad hoc networks; Registers; Vehicular Ad hoc networks (VANETs); authentication; chinese remainder theorem (CRT); conditional privacy-preserving

Funding

  1. National Science Foundation of China [U1936101]
  2. 13th Five-Year Plan of National Cryptography Development Fund for Cryptographic Theory of China [MMJJ20170204]

Ask authors/readers for more resources

This article proposes a novel conditional privacy-preserving authentication protocol for VANETs based on the Chinese remainder theorem (CRT). It addresses the challenges of dynamically updating membership and preserving user privacy, while providing message authentication, anonymity, and forward and backward security.
Existing conditional anonymous authentication protocols to secure the group communication in VANETs (Vehicular Ad hoc Networks) render challenges such as dynamically updating membership in a domain and achieving vehicle user's privacy preservation. This article elegantly addresses these challenges by proposing a novel conditional privacy-preserving authentication with dynamic membership for VANETs depending on chinese remainder theorem (CRT). Specifically, the CRT is utilized by a trusted authority to securely disseminate a domain key for the authorized vehicles in the same domain, where each vehicle in this domain is able to obtain the domain key by only performing one modulo division operation in case of domain key updating. Distinct from the previous works in this field, our proposed protocol not only achieves message authentication, anonymity and conditional privacy-preserving, but also provides forward security and backward security of vehicles. Theoretical analysis and experiment simulation demonstrate that the proposed protocol is provably secure and highly feasible.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available